Is North Korea Really Behind Sony Hack Attack?
Tom Cheshire, Dec. 18, 2014, Sky News
The problem is that it can often be impossible to attribute a cyber attack.
Hackers use fake IP addresses routed through many different computers to throw law enforcement off.
They plant false flags inside the code to shift suspicion on others. Simple stories can't do justice to a very messy and complex affair.
Read more: uk.celebrity.yahoo.com
Follow Larry Elder on Twitter
Tom Cheshire, Dec. 18, 2014, Sky News
The problem is that it can often be impossible to attribute a cyber attack.
Hackers use fake IP addresses routed through many different computers to throw law enforcement off.
They plant false flags inside the code to shift suspicion on others. Simple stories can't do justice to a very messy and complex affair.
Read more: uk.celebrity.yahoo.com
Follow Larry Elder on Twitter
"Like" Larry Elder on Facebook